The Email That Cost a Company $56 Million

The most dangerous email in your inbox looks exactly like one from someone you trust.

It was Tuesday morning when Gwen, the payroll administrator at Midwest Manufacturing, received an email that appeared to be from her CEO, Walter:

"Gwen, I need you to process an urgent wire transfer to finalize the acquisition we discussed last week. The banking details are attached. This is confidential until the announcement, so please handle directly through me. Thanks, Walter"

The email had Walter's name, photo, and even his usual email signature with the company's legal disclaimer. The tone conveyed the same urgency and directness that characterized all of Walter's communications.

Within minutes, Gwen had processed the $56 million transfer to what she believed was the account of an acquisition target.

It wasn't until two days later, during a routine financial review, that the truth emerged: Walter had never sent that email.

The company had become the victim of a phishing attack, and the money had vanished into a network of untraceable offshore accounts.

What are Phishing Attacks?

Phishing attacks are digital con games where cybercriminals pose as legitimate organizations to steal your sensitive information. Think of it like fishing—the attacker casts out bait (a convincing fake email or message) hoping you'll bite by clicking a malicious link or attachment.

For example, you might receive what looks exactly like an Amazon order confirmation for an expensive purchase you never made, with a "Cancel Order" button that leads to a fake Amazon login page. When you enter your credentials to "cancel" this fictional order, the attacker captures your real Amazon username and password, gaining access to your actual account, saved payment methods, and personal details.

These attacks target everyone from individuals to major corporations, using psychological triggers like urgency or fear to bypass rational thinking.

The Growing Sophistication of Phishing Attacks

Phishing has evolved far beyond the grammatically incorrect "a Nigerian prince needs your help" emails of the past. Today's attacks are meticulously crafted with:

  • Perfect grammar and company-specific language

  • Authentic-looking email addresses (walter.smith@midwestmfg-inc.com instead of walter.smith@midwestmfg.com)

  • Real logos, signatures, and design elements

  • Timely contexts that create urgency (tax season, acquisitions, audits)

  • Psychological triggers that bypass rational thinking

For individuals, phishing can lead to drained bank accounts or stolen identities. For small businesses, a single successful attack can threaten the entire operation's survival.

Recognizing Modern Phishing Attacks

Even without technical expertise, you can spot sophisticated phishing attempts by watching for these warning signs:

1. Unexpected Urgency

Any message creating pressure to act quickly deserves extra scrutiny. Legitimate organizations rarely demand immediate action without warning.

For example, "Your account will be terminated in 24 hours unless you verify your information."

2. Hovering Before Clicking

Before clicking any link, hover your mouse over it to reveal the actual destination URL. If Amazon.com emails you but the link points to amazon-secure02.cc, it's a scam.

If the website address shown when hovering doesn't exactly match the company name, don't click.

3. Requests That Break Normal Procedures

Be suspicious when emails ask you to avoid standard processes, especially for financial transactions or password sharing.

For example, "Don't submit this through the usual portal; reply directly to this email."

4. The "Almost Right" Effect

Look closely at sender email addresses, company logos, and website URLs. Phishers often use names that are one letter off or domains with added words (paypal-secure.com instead of paypal.com).

5. Attachments You Weren't Expecting

Never open attachments you weren't specifically expecting, especially if they're unusual file types (.zip, .exe, or even .docx files with macros).

Building Your Phishing Defense System

For Individuals:

  1. Verify through a different channel

    Receive a strange email from your bank? Call the official number on your card, not any number in the email.

  2. Check the email header

    Look at the actual email address, not just the display name. John.Smith@gmail.com is very different from John.Smith@bankofamerica.com.

  3. Use email protection tools

    Most email providers offer decent spam filtering. Enable all security features in your email settings.

For Small Business Owners and Employees:

  1. Establish verification protocols

    Create procedures for approving financial requests that require confirmation through multiple channels.

  2. Implement technical safeguards to help verify email authenticity

    This can be done by your IT personnel. These technical safeguards include Sender Policy Framework (SPF), Domain keys identified mail (DKIM), Brand Indicators for message identification (BIMI), etc.

  3. Create a no-blame reporting culture

    Ensure employees feel comfortable reporting suspicious emails or even mistakes without fear of criticism or punishment.

For Everyone:

  1. Stay informed

    Phishing tactics evolve constantly. Follow cybersecurity news sources or sign up for alerts from organizations like the FTC.

  2. Use anti-phishing tools

    Consider security tools like Malwarebytes or built-in browser protections (on Chrome) that warn about suspicious websites.

  3. Trust your instincts!

    If something feels off about an email, it probably is. Legitimate organizations will understand your caution.

A Simple Daily Practice

Before acting on any email that requests information, clicks, or actions, ask yourself:

  • Was I expecting this communication?

  • Is the sender's address exactly correct?

  • Does the request follow normal procedures?

  • Can I verify this through another channel?

These four questions—requiring no technical expertise—would have saved Midwest Manufacturing $56 million and countless other individuals their life savings.

Remember: The strongest security system isn't technological—it's a healthy skepticism and the patience to verify before acting.


20
Subscribe to my newsletter

Read articles from Oghenemaro Ikelegbe directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Oghenemaro Ikelegbe
Oghenemaro Ikelegbe

I am a passionate, self-starting individual and with a goal-driven and ambitious mindset. I value collaboration and strive to foster a cohesive work environment that encourages collective success. Balancing professional pursuits with personal values, I prioritize religion, relationships, and loved ones. In leisure time, I enjoy reading and taking walks, finding joy in simplicity and continuous learning.